8th Layer Insights

Security is Alive


Listen Later

Every now and then you need to try something new. That's what this episode is. If you listened to Season 2, Episode 3 (Technology and the Law of Unintended Consequences), you may remember the mock interview with Janet, the virtual assistant. This episode expands that idea and features a set of four mock interviews -- all with security-related object. This is an interesting experiment to help flesh-out some ideas behind these objects, the reasons they exist, their motivations, and the situations in which they find themselves.

On this episode, we have four guests: Samantha, a piece of facial recognition software with a really interesting idea, Dave the password who has a pretty bad sharing problem, Devon, a secure email gateway who is struggling with the weight of the world and Barb, the phishing email who will say just about anything possible to get you to click that link.

Guests: 

  • Samantha – Facial Recognition Software
  • Dave – Password
  • Devon – Secure Email Gateway
  • Barb – Phishing Email

  • Books and Resources:

    • MasterClass -- Margaret Atwood Teaches Creative Writing
    • "Everything is Alive" Podcast
    • Krebs on Security - Password Do’s and Don’ts
    • What makes a good password? 9 rules to protect you from cyberattacks
    • World Password Day: Roger Grimes on passwords
    • Q&A With Data-Driven Evangelist Roger Grimes on the Great Password Debate
    • How does facial recognition work?
    • Facial recognition: top 7 trends (tech, vendors, use cases)
    • NISTIR 8238 Ongoing Face Recognition Vendor Test (FRVT) Part 2: Identification
    • How Accurate are Facial Recognition Systems – and Why Does It Matter?
    • Social Engineering Red Flags
    • Email Security Gap Analysis Shows 10.5% Miss Rate
    • What are Email Security Gateways, How Do They Work, and What Can They Offer Your Organization?
    • The Creative Writing Coursebook: 40 Authors Share Advice and Exercises for Fiction and Poetry
    • On Writing: A Memoir of the Craft by Stephen King
    • Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter
    • The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter & Kai Roer


      Production Credits:

      Additional voice talent provided by Luna Freyava, Rich Daigle (a.k.a. Mouth Almighty), Punyaha Mukherjee, and Tabitha Garland

      Music and Sound Effects by Blue Dot SessionsEnvato Elements, & SmartSound

      Artwork by Chris Machowski @ https://www.RansomWear.net/ and Mia Rune @ https://www.MiaRune.com.

      8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/

      Want to get in touch with Perry? Here's how:

      • LinkedIn
      • Twitter
      • Instagram
      • Emailhello [at] 8thLayerInsights [dot] com

        Learn more about your ad choices. Visit megaphone.fm/adchoices

        ...more
        View all episodesView all episodes
        Download on the App Store

        8th Layer InsightsBy Perry Carpenter | N2K Networks

        • 5
        • 5
        • 5
        • 5
        • 5

        5

        56 ratings


        More shows like 8th Layer Insights

        View all
        Security Now (Audio) by TWiT

        Security Now (Audio)

        1,971 Listeners

        SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast) by Johannes B. Ullrich

        SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

        627 Listeners

        Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec by Jerry Bell and Andrew Kalat

        Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec

        367 Listeners

        Hacked by Hacked

        Hacked

        180 Listeners

        CyberWire Daily by N2K Networks

        CyberWire Daily

        1,006 Listeners

        Smashing Security by Graham Cluley & Carole Theriault

        Smashing Security

        310 Listeners

        Click Here by Recorded Future News

        Click Here

        405 Listeners

        Malicious Life by Malicious Life

        Malicious Life

        928 Listeners

        Darknet Diaries by Jack Rhysider

        Darknet Diaries

        7,864 Listeners

        CISO Series Podcast by David Spark, Mike Johnson, and Andy Ellis

        CISO Series Podcast

        187 Listeners

        Hacking Humans by N2K Networks

        Hacking Humans

        314 Listeners

        Defense in Depth by David Spark, Steve Zalewski, Geoff Belknap

        Defense in Depth

        74 Listeners

        Cyber Security Headlines by CISO Series

        Cyber Security Headlines

        127 Listeners

        Hacker And The Fed by Chris Tarbell & Hector Monsegur

        Hacker And The Fed

        158 Listeners

        The FAIK Files by Perry Carpenter | N2K Networks

        The FAIK Files

        12 Listeners